Locally optimum detection for additive watermark:ing in the DCT and DWT domains through non-gaussian distributions

Size: px
Start display at page:

Download "Locally optimum detection for additive watermark:ing in the DCT and DWT domains through non-gaussian distributions"

Transcription

1 Locally optimum detection for additive watermark:ing in the DCT and DWT domains through non-gaussian distributions Antonis Mairgiotis, Lisimachos Kondi Dept. of Computer Science University ofloannina, P.O. Box 1186, Ioannina, Greece Yongyi Yang Dept. of Electr. and Compo Engineering Illinois Institure of Technology Chicago IL, 60616, USA, Abstract-This work presents a new locally optimal blind detector for the additive transform-based image watermarking problem. Working in non-gaussian environments, we introduce a new statistical model and its consequent application in the design of a locally optimum detection test. More specifically, we model the marginal distributions of the detail subband coefficients of DWT (Discrete Wavelet Transform) or DCT (Discrete Cosine Transform) with Student-t distribution. Since the watermark signal has low power, locally most powerful (LMP) detector is a valid choice. The experimental results show that the proposed detector has superior performance than alternative LMP detectors based on known state of the art statistical models. Keywords-image watermarking, locally most powerful test, DWT, DCT, Student-t distribution I. INTRODUCTION Watermarking has received a lot of attention since it has been proved an effective framework for protection of digital media [1][2]. Thus, a watermarking procedure is accomplished by embedding an imperceptible information in host multimedia content without affecting the quality of original data. In addition, following blind watermarking, this secret information continues to be detectable without resorting to the unwatermarked host signal. Watermark detection is a crucial part of a watermarking system and various optimal transform based methods have been proposed all these years [3]-[7]. Common image transforms in image watermarking are DWT, DCT, DFT (Discrete Fourier Transform) or other multiscale transforms [11]. Properties like multiresolution, HVS (Human Visual System) modeling or spatial adaptivity has been proved helpful for better information embedding, efficient watermark detection and in essence improved watermarking schemes [1], [2]. Generally speaking, transform coefficients are considered as channel noise and the hidden information is viewed as the signal to be transmitted through this channel. If we assume that coefficients of our interest obey in a Gaussian law, then linearcorrelator detector, has been proved an optimal solution[1]-[5]. But, marginal distributions of DWT detail subband coefficients or DCT coefficients are non-gaussian thus linear correlator has suboptimal behavior with regard to signal detection [3]-[5]. In previous years, various models have been developed to account for non-gaussian behavior of image statistics. Image data statistics in transform domain are modeled following more heavy-tailed distribution leading to optimal or nearly optimal detectors which exploit the aforementioned characteristic. In the additive watermarking problem Generalized Gaussian Density (GGD) [3], [4] has been widely adopted all these years by many researchers. Cauchy distribution [5]-[7] as a member of SaS (Symmetric alpha Stable) distributions, has been an alternative solution applicable to the same problem. Recently, Student-t distribution has also been proposed in the same context [10]. In this work, within the framework of weak signal detection and additive spread spectrum embedding in both DCT and DWT domains, we propose a class of watermark detectors based on a locally most powerful test [6] using the Student-t distribution. Basic motivations to choose t-distribution for the problem of watermarking is its ability of describing images with different statistical characteristics, the extraction of a simple test statistic and the efficient detection sensitivity compared to other known state of the art detectors, which are based on known statistical distributions. Thus, in case of Student-t we expect that the nonlinear preprocessor will provide us with high detection sensitivity and improved robustness. The model depends on two parameters which can be estimated quickly and easily whereas the whole procedure may become more relaxed if we fix them providing a more light version of the proposed detectors. This work is organized as follows. The next section defines the known additive watermarking detection problem. Section III proposes the new statistical model where the domains of embedding and detection are described in Section IV. Section V presents the experimental results and the final section gives the conclusions. II. ADDITIVE WATERMARKING DETECTION PROBLEM Assuming that we embed the watermark information W= {W[l],...,W[NJ} in an additive way, then the N host /13/$ IEEE DSP2013

2 transform coefficients x = {X[I],...,X[Nl} become V={V[l],...,V[N]}. Watermark detection can be stated as a binary hypothesis problem where in the viewpoint of statistical detection theory [16], [21]: HI : Y[i] = X[i] + aw[i] Ho : Y[i] = X[i] where HI is the alternative hypothesis indicating the presence of hidden information and H 0 is the null hypothesis where no watermark is present. Index i denotes the transform coefficient location where the watermark is supposed to be embedded. Defining the likelihood ratio test and then taking the logarithm, the log-likelihood becomes: where Px (-) is the probability distribution function (pdt) for the problem at hand (noise distribution). The above test is performed using N transform coefficients which are treated as independent identically distributed (i.i.d) random variables. Knowing that a UMP (Uniform Most Powerful) test is quite rare for non-gaussian noise models, in this work we propose a Locally Most Powerful (LMP) test, achieving asymptotically optimum performance for watermark signals with low power level [4] [6] [16]. Based on the imperceptibility condition the magnitudes of hidden information W[i] are small, thus the appropriateness of an LMP test is valid. However, the watermarkg strength is unknown from the receiverg side. Instead of the simple hypothesis test in (1), we resort this to the following composite hypothesis testing [21]: Ho : a = 0, VS HI : a > (3) The alternative hypothesis depends on the unknown watermark strengthg parameter and we seek for a test statistic which is optimal in the sense of LMP test. Therefore, detectorg sensitivity to watermarkg amplitude becomes even smaller. For the log-likelihood in Eq. (2) the Taylor series approximation gives: a I (Y[iJ)1 = I(Y[iDlw{l] I (Y[iJ)lw[T]=o + -a'--y - [i '--. ] W[i]+o(IW[i]1)...!. I rylij=() Excluding the second and higher orders, is almost equal to: I(Y[iDI. _Px'(Y[iD 'W[i]+o(IW[i]l) Will P x (Y[iD = g LO (V[iJ) W[i] where g w (x) denotes the Oocally optimum nonlinearityo as this described in [6]. (1) (2) (4) (5) III. PROPOSED STATISTICAL MODEL An important characteristic of the image statistics in wavelet or DCT domain is that it is non-gaussian having a high kurtosis, sharp central peak and heavy tails [19]. Thus, various non-gaussian pdfs have been proposed in the watermarking literature for modeling the transform coefficients [3]-[8]. In this work, we propose modeling of either marginal distribution of the subband coefficients in DWT [10] or coefficients of DCT transform with Student-t distribution. Student-t distribution is of central importance in statistical inference, since it offers a viable alternative with respect to real world images particularly because its tails are more realistic. The probability density function of Student-t is given by [9]: St(X(i) I O, A,V,JI) = r ( (V+1)/2)( AI ( A 2yV;1 r ( v/2) v n ) l+ ( X( i) -Jl)) In our case, mean value JI is supposed to be equal to zero. Parameter A is usually called the CprecisionO of the t distribution where v is called the Glegrees of freedomo In case v is equal to 1 the t-distribution reduces to the Cauchy distribution, while in the limit v OCJ, the t-distribution with zero mean, precision A and degrees of freedom V becomes a Gaussian with zero mean and precision A. Notice that, Student-t distribution is obtained by adding up an infinite number of Gaussian distributions having the same mean but different precisions [15]. Compared with the Gaussian distribution, Students-t tails have slower decaying, hence we can describe a wider class of images regarding their statistical characteristics in the transform domain. Regarding the estimation of distributiong parameters, we find the Maximum Likelihood (ML) solution by invoking the EM (Expectation Maximization) algorithm as this described in [10], [13]. Notice that the pdf parameters can be estimated efficiently from the watermarked data instead of the original without any violation of test requirements [1], [2]. IV. EMBEDDING AND DETECTION DOMAINS Introducing the previous class of detectors, we consider these locally optimal detectors both in DCT and DWT domains. Both domains are widely applied in image and video processing areas, since they collect attractive features like fast algorithms, efficient implementations etc. A. DCT domain In case of DCT domain, our dataset of interest considers the set of non-dc coefficients. Many distributions such as Gaussian, Laplacian are proposed to describe the statistical distribution of this transform [1], [2], [12]. Although coefficients of low frequencies can not be approximated in an efficient manner by Gaussian or Laplacian distribution as depicted in works of [3], [19]. In the work of [3], [8] Generalized Gaussian has been proposed as an appropriate model for all DCT coefficients except DC. This fact led many researchers to investigate alternative statistical models capable of providing more efficient detectors in the watermarking field. (6)

3 ' characteristic and towards parameters estimation we have to find the ML estimation [7]. Notice that shape parameter cis equal to two for the Gaussian distribution and one for the Laplacian pdf. Usually a fixed value of c offers almost the same detection performance without the estimation partg computational cost. Notice that, the smaller the shape parameter is, the more impulsive the shape and the heavier the tails [4]. D. Cauchy distribution M Figure 1. Watermarked data samples histogram of DeT domain of image CBaboonOand its Student -t pdf model fitting An alternative known model the Cauchy member of SaS distributions and has been a valid approach for the watermarking problem as this proposed in work of [5]-[7]. In this work, we claim that DCT coefficients follow the Student-t distribution, since empirical distribution of these coefficients although they remain bell-shaped as the Gaussian model, they tend to have significant heavier tails [6], [18]. In Figure 1 we can see data histogram of DCT domain of image CBaboonOand its Student-t pdf model fitting. B. DWT domain As indicated in the work of Mallat on wavelets [20], detail subbands can be well described by GGD [7], [8]. In work of Kwitt [7], an alternative Cauchy model was also used for the same detail coefficients. In this work, we propose a two-scale decomposition, as in [10] and we model the second levelg detail coefficients with Student-t pdf. In Figure 2, we can see the data histogram of horizontal data details of image CBaboonO The pdf of Cauchy is given by: p(x) = (8) Jr r +xwith -00 < x < +00. Cauchy also has heavy tails and with regard to distributiong parameters we resort to ML estimation as this depicted in work of [5]-[7]. E. Detectors In this work, we have three test statistics of interest: two of them are derived after nonlinear processing based on Cauchy and Student-t distribution and the third one is the known GGD based detector: 1. Generalized Gaussian: ley) = >c 2. Cauchy with nonlinearity: ley) f 2 [ ]W[i} = I l Y[z]- + r 3. Student-t with nonlinearity: (I y[ill ' -I Y[i] - W[i]I ' ) 1=1 (9) (10) -stoo.nt-tpdl (v + l)y[i]w[i] I(Y) = L.. I l ( + Y[i] 2 J (11) Figure 2. Watermarked data samples histogram of 2ndQ level horizontal details of image CBaboonOand its Student-t pdf model fitting In what follows we briefly review some of the most applicable distributions in additive watermarking for DCT and DWT domains. C. Generalized Gaussian Density. "" The pdf of GGD is given by: p(x) = Ae- 1b X I' (7) where -00 < x < +00 and b, c > 0 [8], [20]. Generally GGD is a widely adopted model for DWT detail subbband coefficients or DCT coefficients [4], [7]. Heavy-tailed behavior is a critical V. EXPERIMENTAL RESULTS A number of experiments have been conducted to measure the sensitivity of the proposed detectors along with the ability to resist against attacks. Thus, the detection performance is measured by ROC (Receiver Op, eratin Char, acteristic) curves. Our test images are the known CLenaOand CBaboonOimages, whereas for statistical significance reasons we make use of Microsoft Object Recognition Image Database [17]. All the images have varying image content and their size is 512x512 pixels. Using DWT domain we applied the Daubechies-8 2D separable filters. Using only one image we generate 100 I-bit spreadspectrum watermarks and at every execution we calculate the corresponding test statistic with and without the watermark. This happens for varying levels of watermarkg power quantification. In the case of the dataset, for every image we add the a common watermark and we evaluate the test statistic for the watermarked and the un-watermarked case.

4 ---+- LO-Caud'rt LO Student! Figure 3. DWI-domain. ROC curves for detector!] comparison in a dataset of images (without attacks), WDR=-44 db, ".. p [ ' ''' _GGD _LO.s I.1 Figure 8. DCI-domain. ROC curves for detector!] comparison in a dataset of images (without attacks), WDR=-22.8 db -----f '.-----,-, -----f ,", p o. I LO _LO-<:... :], -o-ggd..,,,,,,, LO.c.LlGhy ---O----OGD _ LOoStudent.1 Figure 4. DWI-domain. ROC curves for detector!] comparison without attacks based on CLenaOimage, WDR=-31.1 db Figure 9. DCI-domain. ROC curves for detector!] comparison without attacks based on CLenaOmage, WDR=-24.7dB LO'C''''J -o-ggd...-lo.$ludflr'll t Figure 5. DWI-domain. ROC curves for detector!] comparison without attacks hased on CRahoonOima"e. wnr=- 7 dr Figure 10. DCI-domain. ROC curves for detector!] comparison without attacks based on CBaboonO, WDR=-31.9 db LO_C... c;hy --o--ggi) _ L.O Stlld.nl-t Figure 6. DWI-domain. ROC curves for detector!] comparison in a dataset of images (JPEG attack, qf=io), WDR=-29.9 db p.. Figure II. DCI -domain. ROC curves for detector!] comparison ill a dataset of images (JPEG attack, qf=io), WDR=-22.8 db.. ' p Figure 7. DWI-domain. ROC curves for detector!] comparison in a dataset of imae:es IWiener+A WGN attack), WDR=-29.9 db Figure 12. DCI-domain. ROC curves for detector!] comparison in a dataset of images (Wiener+A WGN attack), WDR=-22.8 db

5 In order to provide comparable results we suggest the usage of Student-t detector after nonlinear preprocessing. To realize the scope of the comparison will use as a basis of comparison the known GGD model without preprocessing and the Cauchy model after nonlinear processing [6]. Thus, the detection sensitivity for all the detectors is evaluated on images without any kind of attack and images under compression attacks like JPEG and Wiener filter plus A WGN (Additive White Gaussian Noise) attack. The validation of the detection performance is taking place for the same WDR (Watermark to Document Ratios) as defined in [6]: WDR = 1010gl :;J (db) (12) where (}f" a_ are the watermark and original signal powers respectively defined as: O'w = - L.. W[z], 0' x = - L.. X[z] N i=l N i=l (13) In Figure 3, we examine the performance of the aforementioned pdfs against the LO detector based on Studentt distribution. Using a dataset of images without any kind of attack for DWT -transformed images, we can observe that detection sensitivity of the proposed detection scheme is superior to the corresponding LO Cauchy-based and GGD detector. The same conclusion can be drawn for the case where we have Gandom watermarksoand a fixed image like CLenaO in Figure 4 and CBaboonOin Figure 5. In Figures 6 and 7, we examine the robustness against JPEG attack and a signal processing attack like Wiener filtering plus A WGN attack. The curves show the same comparative relationship between the detectors by the performance criterion after some kind of attack. Thus the proposed t-based detectors under attacks still provide better detection results. With regard to DCT domain, the proposed LO detectors were also applied. More specifically, we applied the statistical detectors in a corresponding plurality of coefficients as in the case of the DWT (10000 coefficients). Thus, putting transform coefficients in a zig-zag order we chose a diagonal band of low to medium frequencies in a full-frame DCT. The results show respective conclusions although not in the same extent. From the work of [6] it is well known that the use of nonlinearities based on Cauchy pdf can lead to performance as good as or even better than that of the optimal GGD. In this study, we derive similar results, where the GGD detector uses the ML estimates for the model parameters. In addition, using Student-t detector, we have superior detection sensitivity against the corresponding LO-Cauchy detector and with the GGD based detector. This conclusion is understood in Figure 8, where t-based detectors in DCT domain are still more sensitive with regard to watermark detection. In Figures 9 and 10 we can observe the same results of the Gandom watermarko case for the two known images CLenaOand CBaboonO In the last two figures (11 and 12) we verify the robust properties of the proposed scheme in the DCT domain, since it has greater resistance to attacks. Thus in the case of the dataset of images, the effect of the attacks is similar for the two types under consideration for all the detectors and the proposed detector has slightly better performance than the other detectors. VI. CONCLUSIONS In this work, we studied the problem of locally optimum detection in the framework of additive watermarking. Working in a non-gaussian environment, we developed a new test statistic based on Student-t modeling of transform coefficients (DWT and DCT). Extensive experiments on images with various statistical characteristics demonstrated the superiority of the proposed t-based locally optimum detector in comparison with known detectors based on alternative statistical models. REFERENCES [1] 1. Cox, M. Miller, and J. Bloom, J. Fridrich, T. Kall(er, Digital Watermarking and Steganography, 2nd edition, Morgan Kaufman, [2] M.Barni, F. Bartolini, Watermarking Systems Engineering, Enabling Digital Assets Security and Other, Marcel Dekker, [3] J. R. Hernandez, M. Amado and F. Peres-Gonzalez, mct-domain Watermarking Techniques for Still Images: Detector Performance Analysis and a New Structure6, IEEE Trans. on Image Processing, Vol. 9, No.1, Jan [4] Q. Cheng and T. S. Huang, 6\n additive approach to transform-domain information hiding and optimum detection structure,6 IEEE Trans. on Multimedia, vol. 3, no. 3, Sept [5] A. Briassouli, P. Tsakalides, A. Stouraitis, CHidden Messages in Heavy Tails: DCT-Domain Watermark Detection Using Alpha-Stable ModelsQ IEEE Trans. on Multimedia, 7(4): , Aug [6] A. Briassouli, M. G. Strintzis, (Locally Optimum Nonlinearities for DCT Watermark DetectionQ IEEE Trans. On Image Processing, vol. 13, no. l2, Dec [7] R. Kwitt, P. Meerwald, A. Uhl, (Lightweight detection of Additive Watermarking in the DWT-DomainQ IEEE Trans. on Image Processing, vol. 20, no. 2, p , Feb [8] A. Nikolaidis, 1. Pitas, O\symptotically Optimal Detection for Additive Watermarking in the DCT and DWT DomainsQ IEEE Trans. on Image Processing, vol. 12, no. 3, p , May [9] C. Bishop, Pattern Recognition and Machine Learning, Springer Verlag, [10] A. Mairgiotis, Y. Yang, L. P. Kondi, mwt-based additive image watermarking using the Student-t priorq IEEE WIFS 2011, Foz do Iquacu, Brazil. [11] M. A. Akhaee, S. M. E. Sahraeian, F. Marvasti, Contourlet-Based Image Watermarking Using Optimum Detector in a Noisy EnvironmentQ IEEE Trans. on Image Processing, vol. 19, noa, April 2010 [12] T. M. Ng, H. K. Garg, CMaximum-Likelihood detection in DWT domain image watermarking using Laplacian modelingq IEEE Signal Processing Letters, 2005, vol. 12, no. 4, pp [13] C. Liu and D. B. Rubin, CML Estimation of the T Distribution Using EM and Its Extensions, ECM and ECMEQ Statistica Sinica 5, 19-39, [14] A. K. Mairgiotis, N. P. Galatsanos, Y. Yang, <'New Additive Watermark Detectorsbased on a Hierarchical Spatially Adaptive Image ModelQ vol. 3, no. l, pp [15] D. F. Andrews, C. L. Mallows, Scale mixtures of normal distributions, J. Roy. Statist. Sec. B, 36: , 1974 [16] S. M. Kay, Fundamental of Statistical Signal Processing: Detection Theory, vol. 2, Prentice Hall, [17] Microsoft Research Cambridge Object Recognition Image Database, com! download s.

6 [18] K. A. Birney, T. R. Fischer, mn the modeling of DCT and subband image data for compressionq IEEE Trans. On Image Processing, vol. 4, pp , Feb [19] R. J. Clarke, Transform Coding of Images, New York Academic, 1985 [20] S. G. Mallat, 6\ theory for multiresolution signal decomposition: The wavelet representation Q IEEE Trans. Pattern. Anal. Machine Intell., vol. II, no. 7, pp , 1989 [21] H. V. Poor, An Introduction to Signal Detection and Estimation, 2 nd edition, New York: Springer-Verlag 1994

ISeCure. Nowadays, copyright infringement, unauthorized. The ISC Int'l Journal of Information Security

ISeCure. Nowadays, copyright infringement, unauthorized. The ISC Int'l Journal of Information Security The ISC Int'l Journal of Information Security July 216, Volume 8, Number 2 (pp. 131 139) http://www.isecure-journal.org Optimum Decoder for Multiplicative Spread Spectrum Image Watermarking with Laplacian

More information

Digital Watermark Detection in Visual Multimedia Content

Digital Watermark Detection in Visual Multimedia Content Digital Watermark Detection in Visual Multimedia Content PhD Thesis Defense Peter Meerwald Dept. of Computer Sciences, University of Salzburg September 2010 Watermarking Watermarking is a technology to

More information

Study of Wavelet Functions of Discrete Wavelet Transformation in Image Watermarking

Study of Wavelet Functions of Discrete Wavelet Transformation in Image Watermarking Study of Wavelet Functions of Discrete Wavelet Transformation in Image Watermarking Navdeep Goel 1,a, Gurwinder Singh 2,b 1ECE Section, Yadavindra College of Engineering, Talwandi Sabo 2Research Scholar,

More information

NOISE can sometimes improve nonlinear signal processing

NOISE can sometimes improve nonlinear signal processing 488 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 59, NO. 2, FEBRUARY 2011 Noise Benefits in Quantizer-Array Correlation Detection and Watermark Decoding Ashok Patel, Member, IEEE, and Bart Kosko, Fellow,

More information

Research Article NSCT Domain Additive Watermark Detection Using RAO Hypothesis Test and Cauchy Distribution

Research Article NSCT Domain Additive Watermark Detection Using RAO Hypothesis Test and Cauchy Distribution Mathematical Problems in Engineering Volume 2016, Article ID 4065215, 18 pages http://dx.doi.org/10.1155/2016/4065215 Research Article SCT Domain Additive Watermark Detection Using RAO Hypothesis Test

More information

University of Siena. Multimedia Security. Watermark extraction. Mauro Barni University of Siena. M. Barni, University of Siena

University of Siena. Multimedia Security. Watermark extraction. Mauro Barni University of Siena. M. Barni, University of Siena Multimedia Security Mauro Barni University of Siena : summary Optimum decoding/detection Additive SS watermarks Decoding/detection of QIM watermarks The dilemma of de-synchronization attacks Geometric

More information

WATERMARKING has been proposed as a technology

WATERMARKING has been proposed as a technology c IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution

More information

Lightweight Detection of Additive Watermarking in the DWT-Domain

Lightweight Detection of Additive Watermarking in the DWT-Domain Lightweight Detection of Additive Watermarking in the DWT-Domain Roland Kwitt Peter Meerwald Andreas Uhl Technical Report 2010-04 May 2010 Department of Computer Sciences Jakob-Haringer-Straße 2 5020 Salzburg

More information

Watermark Extraction Optimization Using PSO Algorithm

Watermark Extraction Optimization Using PSO Algorithm Research Journal of Applied Sciences, Engineering and Technology 5(12): 3312-3319, 2013 ISS: 2040-7459; e-iss: 2040-7467 Maxwell Scientific Organization, 2013 Submitted: June 09, 2012 Accepted: July 18,

More information

Digital Image Watermarking Algorithm Based on Wavelet Packet

Digital Image Watermarking Algorithm Based on Wavelet Packet www.ijcsi.org 403 Digital Image ing Algorithm Based on Wavelet Packet 1 A.Geetha, 2 B.Vijayakumari, 3 C.Nagavani, 4 T.Pandiselvi 1 3 4 Faculty of Kamaraj College of Engineering and Technology Department

More information

Robust Watermarking Procedure based on JPEG-DCT Image Compression

Robust Watermarking Procedure based on JPEG-DCT Image Compression TIME-FREQUENCY SIGNAL ANALYSIS 1649 Robust Watermarking Procedure based on JPEG-DCT Image Compression Srdjan Stanković, Irena Orović, and Nikola Žarić Abstract A new procedure for watermarking in the 8x8

More information

Wavelet Packet Based Digital Image Watermarking

Wavelet Packet Based Digital Image Watermarking Wavelet Packet Based Digital Image ing A.Adhipathi Reddy, B.N.Chatterji Department of Electronics and Electrical Communication Engg. Indian Institute of Technology, Kharagpur 72 32 {aar, bnc}@ece.iitkgp.ernet.in

More information

4348 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 23, NO. 10, OCTOBER 2014

4348 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 23, NO. 10, OCTOBER 2014 4348 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 3, NO. 10, OCTOBER 014 A Study of Multiplicative Watermark Detection in the Contourlet Domain Using Alpha-Stable Distributions Hamidreza Sadreazami, Student

More information

1782 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 18, NO. 8, AUGUST 2009

1782 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 18, NO. 8, AUGUST 2009 1782 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 18, NO. 8, AUGUST 2009 A New Statistical Detector for DWT-Based Additive Image Watermarking Using the Gauss Hermite Expansion S. M. Mahbubur Rahman, M.

More information

Double Sided Watermark Embedding and Detection with Perceptual Analysis

Double Sided Watermark Embedding and Detection with Perceptual Analysis DOUBLE SIDED WATERMARK EMBEDDIG AD DETECTIO WITH PERCEPTUAL AALYSIS Double Sided Watermark Embedding and Detection with Perceptual Analysis Jidong Zhong and Shangteng Huang Abstract In our previous work,

More information

Research Article Effect of Different Places in Applying Laplacian Filter on the Recovery Algorithm in Spatial Domain Watermarking

Research Article Effect of Different Places in Applying Laplacian Filter on the Recovery Algorithm in Spatial Domain Watermarking Research Journal of Applied Sciences, Engineering and Technology 7(24): 5157-5162, 2014 DOI:10.19026/rjaset.7.912 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitted:

More information

An Image Watermarking Based on the pdf Modeling and Quantization Effects in the Wavelet Domain

An Image Watermarking Based on the pdf Modeling and Quantization Effects in the Wavelet Domain An Image Watermarking Based on the pdf Modeling and Quantization Effects in the Wavelet Domain Irena Orović, Milica Orlandić and Srdjan Stanković Faculty of Electrical Engineering, University of Montenegro

More information

Modeling Multiscale Differential Pixel Statistics

Modeling Multiscale Differential Pixel Statistics Modeling Multiscale Differential Pixel Statistics David Odom a and Peyman Milanfar a a Electrical Engineering Department, University of California, Santa Cruz CA. 95064 USA ABSTRACT The statistics of natural

More information

Noise Benefits in Quantizer-Array Correlation Detection and Watermark Decoding

Noise Benefits in Quantizer-Array Correlation Detection and Watermark Decoding To appear in the IEEE Transactions on Signal Processing Current draft: 9 November 010 Noise Benefits in Quantizer-Array Correlation Detection and Watermark Decoding Ashok Patel, Member IEEE, and Bart Kosko,

More information

ROTATION, TRANSLATION AND SCALING INVARIANT WATERMARKING USING A GENERALIZED RADON TRANSFORMATION

ROTATION, TRANSLATION AND SCALING INVARIANT WATERMARKING USING A GENERALIZED RADON TRANSFORMATION ROTATION, TRANSLATION AND SCALING INVARIANT WATERMARKING USING A GENERALIZED RADON TRANSFORMATION D. SIMITOPOULOS, A. OIKONOMOPOULOS, AND M. G. STRINTZIS Aristotle University of Thessaloniki Electrical

More information

A Modified Moment-Based Image Watermarking Method Robust to Cropping Attack

A Modified Moment-Based Image Watermarking Method Robust to Cropping Attack A Modified Moment-Based Watermarking Method Robust to Cropping Attack Tianrui Zong, Yong Xiang, and Suzan Elbadry School of Information Technology Deakin University, Burwood Campus Melbourne, Australia

More information

Image Dependent Log-likelihood Ratio Allocation for Repeat Accumulate Code based Decoding in Data Hiding Channels

Image Dependent Log-likelihood Ratio Allocation for Repeat Accumulate Code based Decoding in Data Hiding Channels Image Dependent Log-likelihood Ratio Allocation for Repeat Accumulate Code based Decoding in Data Hiding Channels Anindya Sarkar and B. S. Manjunath Department of Electrical and Computer Engineering, University

More information

Image Denoising using Uniform Curvelet Transform and Complex Gaussian Scale Mixture

Image Denoising using Uniform Curvelet Transform and Complex Gaussian Scale Mixture EE 5359 Multimedia Processing Project Report Image Denoising using Uniform Curvelet Transform and Complex Gaussian Scale Mixture By An Vo ISTRUCTOR: Dr. K. R. Rao Summer 008 Image Denoising using Uniform

More information

Abstract The aim of this paper is to improve the performance of spatial domain watermarking. To this end, a new perceptual mask

Abstract The aim of this paper is to improve the performance of spatial domain watermarking. To this end, a new perceptual mask Efficient Spatial Image Watermarking via New Perceptual Masking and Blind Detection Schemes Irene G. Karybali, Member, IEEE, and Kostas Berberidis, Member, IEEE Abstract The aim of this paper is to improve

More information

Detection theory 101 ELEC-E5410 Signal Processing for Communications

Detection theory 101 ELEC-E5410 Signal Processing for Communications Detection theory 101 ELEC-E5410 Signal Processing for Communications Binary hypothesis testing Null hypothesis H 0 : e.g. noise only Alternative hypothesis H 1 : signal + noise p(x;h 0 ) γ p(x;h 1 ) Trade-off

More information

An Investigation of 3D Dual-Tree Wavelet Transform for Video Coding

An Investigation of 3D Dual-Tree Wavelet Transform for Video Coding MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.merl.com An Investigation of 3D Dual-Tree Wavelet Transform for Video Coding Beibei Wang, Yao Wang, Ivan Selesnick and Anthony Vetro TR2004-132 December

More information

This is a repository copy of The effect of quality scalable image compression on robust watermarking.

This is a repository copy of The effect of quality scalable image compression on robust watermarking. This is a repository copy of The effect of quality scalable image compression on robust watermarking. White Rose Research Online URL for this paper: http://eprints.whiterose.ac.uk/7613/ Conference or Workshop

More information

Optimal Mean-Square Noise Benefits in Quantizer-Array Linear Estimation Ashok Patel and Bart Kosko

Optimal Mean-Square Noise Benefits in Quantizer-Array Linear Estimation Ashok Patel and Bart Kosko IEEE SIGNAL PROCESSING LETTERS, VOL. 17, NO. 12, DECEMBER 2010 1005 Optimal Mean-Square Noise Benefits in Quantizer-Array Linear Estimation Ashok Patel and Bart Kosko Abstract A new theorem shows that

More information

The New Graphic Description of the Haar Wavelet Transform

The New Graphic Description of the Haar Wavelet Transform he New Graphic Description of the Haar Wavelet ransform Piotr Porwik and Agnieszka Lisowska Institute of Informatics, Silesian University, ul.b dzi ska 39, 4-00 Sosnowiec, Poland porwik@us.edu.pl Institute

More information

Digital Image Processing

Digital Image Processing Digital Image Processing, 2nd ed. Digital Image Processing Chapter 7 Wavelets and Multiresolution Processing Dr. Kai Shuang Department of Electronic Engineering China University of Petroleum shuangkai@cup.edu.cn

More information

STA 4273H: Statistical Machine Learning

STA 4273H: Statistical Machine Learning STA 4273H: Statistical Machine Learning Russ Salakhutdinov Department of Statistics! rsalakhu@utstat.toronto.edu! http://www.utstat.utoronto.ca/~rsalakhu/ Sidney Smith Hall, Room 6002 Lecture 11 Project

More information

Adaptive Audio Watermarking via the Optimization. Point of View on the Wavelet-Based Entropy

Adaptive Audio Watermarking via the Optimization. Point of View on the Wavelet-Based Entropy Adaptive Audio Watermarking via the Optimization Point of View on the Wavelet-Based Entropy Shuo-Tsung Chen, Huang-Nan Huang 1 and Chur-Jen Chen Department of Mathematics, Tunghai University, Taichung

More information

- An Image Coding Algorithm

- An Image Coding Algorithm - An Image Coding Algorithm Shufang Wu http://www.sfu.ca/~vswu vswu@cs.sfu.ca Friday, June 14, 2002 22-1 Agenda Overview Discrete Wavelet Transform Zerotree Coding of Wavelet Coefficients Successive-Approximation

More information

On Information Maximization and Blind Signal Deconvolution

On Information Maximization and Blind Signal Deconvolution On Information Maximization and Blind Signal Deconvolution A Röbel Technical University of Berlin, Institute of Communication Sciences email: roebel@kgwtu-berlinde Abstract: In the following paper we investigate

More information

PATTERN RECOGNITION AND MACHINE LEARNING

PATTERN RECOGNITION AND MACHINE LEARNING PATTERN RECOGNITION AND MACHINE LEARNING Slide Set 3: Detection Theory January 2018 Heikki Huttunen heikki.huttunen@tut.fi Department of Signal Processing Tampere University of Technology Detection theory

More information

Rotation, scale and translation invariant digital image watermarking. O'RUANAIDH, Joséph John, PUN, Thierry. Abstract

Rotation, scale and translation invariant digital image watermarking. O'RUANAIDH, Joséph John, PUN, Thierry. Abstract Proceedings Chapter Rotation, scale and translation invariant digital image watermarking O'RUANAIDH, Joséph John, PUN, Thierry Abstract A digital watermark is an invisible mark embedded in a digital image

More information

RECONSTRUCTED QUANTIZED COEFFICIENTS MODELED WITH GENERALIZED GAUSSIAN DISTRIBUTION WITH EXPONENT 1/3

RECONSTRUCTED QUANTIZED COEFFICIENTS MODELED WITH GENERALIZED GAUSSIAN DISTRIBUTION WITH EXPONENT 1/3 Image Processing & Communications, vol. 2, no. 4, pp.5-2 DOI:.55/ipc-26-9 5 RECONSTRUCTED QUANTIZED COEFFICIENTS MODELED WITH GENERALIZED GAUSSIAN DISTRIBUTION WITH EXPONENT /3 ROBERT KRUPIŃSKI West-Pomeranian

More information

ELEG 833. Nonlinear Signal Processing

ELEG 833. Nonlinear Signal Processing Nonlinear Signal Processing ELEG 833 Gonzalo R. Arce Department of Electrical and Computer Engineering University of Delaware arce@ee.udel.edu February 15, 2005 1 INTRODUCTION 1 Introduction Signal processing

More information

PROPERTIES OF THE EMPIRICAL CHARACTERISTIC FUNCTION AND ITS APPLICATION TO TESTING FOR INDEPENDENCE. Noboru Murata

PROPERTIES OF THE EMPIRICAL CHARACTERISTIC FUNCTION AND ITS APPLICATION TO TESTING FOR INDEPENDENCE. Noboru Murata ' / PROPERTIES OF THE EMPIRICAL CHARACTERISTIC FUNCTION AND ITS APPLICATION TO TESTING FOR INDEPENDENCE Noboru Murata Waseda University Department of Electrical Electronics and Computer Engineering 3--

More information

Fast and Automatic Watermark Resynchronization based on Zernike. Moments

Fast and Automatic Watermark Resynchronization based on Zernike. Moments Fast and Automatic Watermark Resynchronization based on Zernike Moments Xiangui Kang a, Chunhui Liu a, Wenjun Zeng b, Jiwu Huang a, Congbai Liu a a Dept. of ECE., Sun Yat-Sen Univ. (Zhongshan Univ.), Guangzhou

More information

STATISTICAL DETECTION OF INFORMATION HIDING BASED ON ADJACENT PIXELS DIFFERENCE

STATISTICAL DETECTION OF INFORMATION HIDING BASED ON ADJACENT PIXELS DIFFERENCE 2th European Signal Processing Conference EUSIPCO 22) Bucharest, Romania, August 27-3, 22 STATISTICAL DETECTION OF INFORMATION HIDING BASED ON ADJACENT PIXELS DIFFERENCE Rémi Cogranne, Cathel Zitzmann,

More information

Information Hiding and Covert Communication

Information Hiding and Covert Communication Information Hiding and Covert Communication Andrew Ker adk @ comlab.ox.ac.uk Royal Society University Research Fellow Oxford University Computing Laboratory Foundations of Security Analysis and Design

More information

Steganalysis of Spread Spectrum Data Hiding Exploiting Cover Memory

Steganalysis of Spread Spectrum Data Hiding Exploiting Cover Memory Steganalysis of Spread Spectrum Data Hiding Exploiting Cover Memory Kenneth Sullivan, Upamanyu Madhow, Shivkumar Chandrasekaran, and B.S. Manjunath Department of Electrical and Computer Engineering University

More information

Quantitative Steganalysis of LSB Embedding in JPEG Domain

Quantitative Steganalysis of LSB Embedding in JPEG Domain Quantitative Steganalysis of LSB Embedding in JPEG Domain Jan Kodovský, Jessica Fridrich September 10, 2010 / ACM MM&Sec 10 1 / 17 Motivation Least Significant Bit (LSB) embedding Simplicity, high embedding

More information

BLIND DT-CWT DOMAIN ADDITIVE SPREAD-SPECTRUM WATERMARK DETECTION. Roland Kwitt and Peter Meerwald and Andreas Uhl

BLIND DT-CWT DOMAIN ADDITIVE SPREAD-SPECTRUM WATERMARK DETECTION. Roland Kwitt and Peter Meerwald and Andreas Uhl c IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution

More information

TCQ PRACTICAL EVALUATION IN THE HYPER-CUBE WATERMARKING FRAMEWORK. 161, rue Ada, Montpellier cedex 05, France contact:

TCQ PRACTICAL EVALUATION IN THE HYPER-CUBE WATERMARKING FRAMEWORK. 161, rue Ada, Montpellier cedex 05, France contact: TCQ PRACTICAL EVALUATION IN THE HYPER-CUBE WATERMARKING FRAMEWORK Marc CHAUMONT 1,2 and Dalila GOUDIA 2 1 University of Nîmes, Place Gabriel Péri, 30000 Nîmes, France 2 Laboratory LIRMM, UMR CNRS 5506,

More information

Quantization Based Watermarking Methods Against Valumetric Distortions

Quantization Based Watermarking Methods Against Valumetric Distortions International Journal of Automation and Computing 14(6), December 2017, 672-685 DOI: 10.1007/s11633-016-1010-6 Quantization Based Watermarking Methods Against Valumetric Distortions Zai-Ran Wang 1,2 Jing

More information

Capacity of Full Frame DCT Image Watermarks

Capacity of Full Frame DCT Image Watermarks 1450 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 9, NO. 8, AUGUST 2000 is always better when the nonseparable algorithm is used (around 1 db) compared with the separable approach. Nevertheless, the quality

More information

Spread Spectrum Watermarking. Information Technologies for IPR Protection

Spread Spectrum Watermarking. Information Technologies for IPR Protection Spread Spectrum Watermarking Information Technologies for IPR Protection Spread Spectrum Communication A Narrow-band signal is transmitted over a much larger bandwidth such that the signal energy presented

More information

Witsenhausen s counterexample and its links with multimedia security problems

Witsenhausen s counterexample and its links with multimedia security problems Witsenhausen s counterexample and its links with multimedia security problems Pedro Comesaña-Alfaro Fernando Pérez-González Chaouki T. Abdallah IWDW 2011 Atlantic City, New Jersey Outline Introduction

More information

An Invariance Property of the Generalized Likelihood Ratio Test

An Invariance Property of the Generalized Likelihood Ratio Test 352 IEEE SIGNAL PROCESSING LETTERS, VOL. 10, NO. 12, DECEMBER 2003 An Invariance Property of the Generalized Likelihood Ratio Test Steven M. Kay, Fellow, IEEE, and Joseph R. Gabriel, Member, IEEE Abstract

More information

A Framework for Optimizing Nonlinear Collusion Attacks on Fingerprinting Systems

A Framework for Optimizing Nonlinear Collusion Attacks on Fingerprinting Systems A Framework for Optimizing onlinear Collusion Attacks on Fingerprinting Systems egar iyavash Department of Electrical and Computer Engineering University of Illinois at Urbana-Champaign Coordinated Science

More information

An Analytic Distance Metric for Gaussian Mixture Models with Application in Image Retrieval

An Analytic Distance Metric for Gaussian Mixture Models with Application in Image Retrieval An Analytic Distance Metric for Gaussian Mixture Models with Application in Image Retrieval G. Sfikas, C. Constantinopoulos *, A. Likas, and N.P. Galatsanos Department of Computer Science, University of

More information

Audio Zero-Watermarking Based on Discrete Hartley Transform and Non-Negative Matrix Factorization

Audio Zero-Watermarking Based on Discrete Hartley Transform and Non-Negative Matrix Factorization IJCSNS International Journal of Computer Science and Networ Security, VOL7 No8, August 207 Audio Zero-Watermaring Based on Discrete Hartley Transform and Non-Negative Matrix Factorization Pranab Kumar

More information

Watermark Detection after Quantization Attacks

Watermark Detection after Quantization Attacks Watermark Detection after Quantization Attacks Joachim J. Eggers and Bernd Girod Telecommunications Laboratory University of Erlangen-Nuremberg Cauerstr. 7/NT, 9158 Erlangen, Germany feggers,girodg@lnt.de

More information

Modifying Voice Activity Detection in Low SNR by correction factors

Modifying Voice Activity Detection in Low SNR by correction factors Modifying Voice Activity Detection in Low SNR by correction factors H. Farsi, M. A. Mozaffarian, H.Rahmani Department of Electrical Engineering University of Birjand P.O. Box: +98-9775-376 IRAN hfarsi@birjand.ac.ir

More information

1. INTRODUCTION. Yen-Chung Chiu. Wen-Hsiang Tsai.

1. INTRODUCTION. Yen-Chung Chiu. Wen-Hsiang Tsai. Copyright Protection by Watermarking for Color Images against Rotation and Scaling Attacks Using Coding and Synchronization of Peak Locations in DFT Domain Yen-Chung Chiu Department of Computer and Information

More information

Multiresolution image processing

Multiresolution image processing Multiresolution image processing Laplacian pyramids Some applications of Laplacian pyramids Discrete Wavelet Transform (DWT) Wavelet theory Wavelet image compression Bernd Girod: EE368 Digital Image Processing

More information

INFORMATION THEORETICAL LIMIT OF COMPRESSION FORENSICS

INFORMATION THEORETICAL LIMIT OF COMPRESSION FORENSICS 24 IEEE International Conference on Acoustic, Speech and Signal Processing ICASSP) INFORATION THEORETICAL LIIT OF COPRESSION FORENSICS Xiaoyu Chu, Yan Chen 2, atthew C. Stamm #3 and K. J. Ray Liu 4 Dept.

More information

CSE 408 Multimedia Information System Yezhou Yang

CSE 408 Multimedia Information System Yezhou Yang Image and Video Compression CSE 408 Multimedia Information System Yezhou Yang Lots of slides from Hassan Mansour Class plan Today: Project 2 roundup Today: Image and Video compression Nov 10: final project

More information

Detection theory. H 0 : x[n] = w[n]

Detection theory. H 0 : x[n] = w[n] Detection Theory Detection theory A the last topic of the course, we will briefly consider detection theory. The methods are based on estimation theory and attempt to answer questions such as Is a signal

More information

Multimedia Networking ECE 599

Multimedia Networking ECE 599 Multimedia Networking ECE 599 Prof. Thinh Nguyen School of Electrical Engineering and Computer Science Based on lectures from B. Lee, B. Girod, and A. Mukherjee 1 Outline Digital Signal Representation

More information

Luminance, disparity and range statistics in 3D natural scenes

Luminance, disparity and range statistics in 3D natural scenes Luminance, disparity and range statistics in 3D natural scenes Yang Liu* a, Lawrence K. Cormack b, Alan C. Bovik a a LIVE, Dept. of ECE, Univ. of Texas at Austin, Austin, TX b Center of Perceptual Systems,

More information

NEURAL NETWORK FOR THE FAST GAUSSIAN DISTRIBUTION TEST

NEURAL NETWORK FOR THE FAST GAUSSIAN DISTRIBUTION TEST IGOR BELI^, ALEKSANDER PUR NEURAL NETWORK FOR THE FAST GAUSSIAN DISTRIBUTION TEST There are several problems where it is very important to know whether the tested data are distributed according to the

More information

2. Definition & Classification

2. Definition & Classification Information Hiding Data Hiding K-H Jung Agenda 1. Data Hiding 2. Definition & Classification 3. Related Works 4. Considerations Definition of Data Hiding 3 Data Hiding, Information Hiding Concealing secret

More information

Optimized Feature Extraction for Learning-Based Image Steganalysis

Optimized Feature Extraction for Learning-Based Image Steganalysis Optimized Feature Extraction for Learning-Based Image Steganalysis Ying Wang, Student Member, IEEE, and Pierre Moulin, Fellow, IEEE Abstract The purpose of image steganalysis is to detect the presence

More information

Inverse Problems in Image Processing

Inverse Problems in Image Processing H D Inverse Problems in Image Processing Ramesh Neelamani (Neelsh) Committee: Profs. R. Baraniuk, R. Nowak, M. Orchard, S. Cox June 2003 Inverse Problems Data estimation from inadequate/noisy observations

More information

STA 414/2104: Machine Learning

STA 414/2104: Machine Learning STA 414/2104: Machine Learning Russ Salakhutdinov Department of Computer Science! Department of Statistics! rsalakhu@cs.toronto.edu! http://www.cs.toronto.edu/~rsalakhu/ Lecture 9 Sequential Data So far

More information

Module 4. Multi-Resolution Analysis. Version 2 ECE IIT, Kharagpur

Module 4. Multi-Resolution Analysis. Version 2 ECE IIT, Kharagpur Module 4 Multi-Resolution Analysis Lesson Multi-resolution Analysis: Discrete avelet Transforms Instructional Objectives At the end of this lesson, the students should be able to:. Define Discrete avelet

More information

Object recognition based on impulse restoration with use of the expectation-maximization algorithm

Object recognition based on impulse restoration with use of the expectation-maximization algorithm Abu-Naser et al. Vol. 15, No. 9/September 1998/J. Opt. Soc. Am. A 2327 Object recognition based on impulse restoration with use of the expectation-maximization algorithm Ahmad Abu-Naser, Nikolas P. Galatsanos,*

More information

The Laplacian PDF Distance: A Cost Function for Clustering in a Kernel Feature Space

The Laplacian PDF Distance: A Cost Function for Clustering in a Kernel Feature Space The Laplacian PDF Distance: A Cost Function for Clustering in a Kernel Feature Space Robert Jenssen, Deniz Erdogmus 2, Jose Principe 2, Torbjørn Eltoft Department of Physics, University of Tromsø, Norway

More information

Data-Hiding Capacities of Non-Redundant Complex Wavelets

Data-Hiding Capacities of Non-Redundant Complex Wavelets Data-Hiding Capacities of Non-Redundant Complex Wavelets Lahouari Ghouti School of Computer Science, Queen's University of Belfast. Belfast BT7 INN, United ingdom. Email: L.Ghouti@qub.ac.uk eywords: Digital

More information

New Steganographic scheme based of Reed- Solomon codes

New Steganographic scheme based of Reed- Solomon codes New Steganographic scheme based of Reed- Solomon codes I. DIOP; S.M FARSSI ;O. KHOUMA ; H. B DIOUF ; K.TALL ; K.SYLLA Ecole Supérieure Polytechnique de l Université Dakar Sénégal Email: idydiop@yahoo.fr;

More information

Can the sample being transmitted be used to refine its own PDF estimate?

Can the sample being transmitted be used to refine its own PDF estimate? Can the sample being transmitted be used to refine its own PDF estimate? Dinei A. Florêncio and Patrice Simard Microsoft Research One Microsoft Way, Redmond, WA 98052 {dinei, patrice}@microsoft.com Abstract

More information

ROC Curves for Steganalysts

ROC Curves for Steganalysts ROC Curves for Steganalysts Andreas Westfeld Technische Universität Dresden Institut für Systemarchitektur 01062 Dresden mailto:westfeld@inf.tu-dresden.de 1 Introduction There are different approaches

More information

SIGNAL COMPRESSION. 8. Lossy image compression: Principle of embedding

SIGNAL COMPRESSION. 8. Lossy image compression: Principle of embedding SIGNAL COMPRESSION 8. Lossy image compression: Principle of embedding 8.1 Lossy compression 8.2 Embedded Zerotree Coder 161 8.1 Lossy compression - many degrees of freedom and many viewpoints The fundamental

More information

Inferring the Causal Decomposition under the Presence of Deterministic Relations.

Inferring the Causal Decomposition under the Presence of Deterministic Relations. Inferring the Causal Decomposition under the Presence of Deterministic Relations. Jan Lemeire 1,2, Stijn Meganck 1,2, Francesco Cartella 1, Tingting Liu 1 and Alexander Statnikov 3 1-ETRO Department, Vrije

More information

Transform coding - topics. Principle of block-wise transform coding

Transform coding - topics. Principle of block-wise transform coding Transform coding - topics Principle of block-wise transform coding Properties of orthonormal transforms Discrete cosine transform (DCT) Bit allocation for transform Threshold coding Typical coding artifacts

More information

IMPROVEMENTS IN MODAL PARAMETER EXTRACTION THROUGH POST-PROCESSING FREQUENCY RESPONSE FUNCTION ESTIMATES

IMPROVEMENTS IN MODAL PARAMETER EXTRACTION THROUGH POST-PROCESSING FREQUENCY RESPONSE FUNCTION ESTIMATES IMPROVEMENTS IN MODAL PARAMETER EXTRACTION THROUGH POST-PROCESSING FREQUENCY RESPONSE FUNCTION ESTIMATES Bere M. Gur Prof. Christopher Niezreci Prof. Peter Avitabile Structural Dynamics and Acoustic Systems

More information

Digital Image Processing

Digital Image Processing Digital Image Processing Wavelets and Multiresolution Processing (Wavelet Transforms) Christophoros Nikou cnikou@cs.uoi.gr University of Ioannina - Department of Computer Science 2 Contents Image pyramids

More information

ECE533 Digital Image Processing. Embedded Zerotree Wavelet Image Codec

ECE533 Digital Image Processing. Embedded Zerotree Wavelet Image Codec University of Wisconsin Madison Electrical Computer Engineering ECE533 Digital Image Processing Embedded Zerotree Wavelet Image Codec Team members Hongyu Sun Yi Zhang December 12, 2003 Table of Contents

More information

YARN TENSION PATTERN RETRIEVAL SYSTEM BASED ON GAUSSIAN MAXIMUM LIKELIHOOD. Received July 2010; revised December 2010

YARN TENSION PATTERN RETRIEVAL SYSTEM BASED ON GAUSSIAN MAXIMUM LIKELIHOOD. Received July 2010; revised December 2010 International Journal of Innovative Computing, Information and Control ICIC International c 2011 ISSN 1349-4198 Volume 7, Number 11, November 2011 pp. 6261 6272 YARN TENSION PATTERN RETRIEVAL SYSTEM BASED

More information

Multiscale Image Transforms

Multiscale Image Transforms Multiscale Image Transforms Goal: Develop filter-based representations to decompose images into component parts, to extract features/structures of interest, and to attenuate noise. Motivation: extract

More information

Empirical Analysis of Invariance of Transform Coefficients under Rotation

Empirical Analysis of Invariance of Transform Coefficients under Rotation International Journal of Engineering Research and Development e-issn: 2278-67X, p-issn: 2278-8X, www.ijerd.com Volume, Issue 5 (May 25), PP.43-5 Empirical Analysis of Invariance of Transform Coefficients

More information

Statistical Filters for Crowd Image Analysis

Statistical Filters for Crowd Image Analysis Statistical Filters for Crowd Image Analysis Ákos Utasi, Ákos Kiss and Tamás Szirányi Distributed Events Analysis Research Group, Computer and Automation Research Institute H-1111 Budapest, Kende utca

More information

ECE 634: Digital Video Systems Wavelets: 2/21/17

ECE 634: Digital Video Systems Wavelets: 2/21/17 ECE 634: Digital Video Systems Wavelets: 2/21/17 Professor Amy Reibman MSEE 356 reibman@purdue.edu hjp://engineering.purdue.edu/~reibman/ece634/index.html A short break to discuss wavelets Wavelet compression

More information

Distinguishing Causes from Effects using Nonlinear Acyclic Causal Models

Distinguishing Causes from Effects using Nonlinear Acyclic Causal Models Distinguishing Causes from Effects using Nonlinear Acyclic Causal Models Kun Zhang Dept of Computer Science and HIIT University of Helsinki 14 Helsinki, Finland kun.zhang@cs.helsinki.fi Aapo Hyvärinen

More information

Basic Principles of Video Coding

Basic Principles of Video Coding Basic Principles of Video Coding Introduction Categories of Video Coding Schemes Information Theory Overview of Video Coding Techniques Predictive coding Transform coding Quantization Entropy coding Motion

More information

Distinguishing Causes from Effects using Nonlinear Acyclic Causal Models

Distinguishing Causes from Effects using Nonlinear Acyclic Causal Models JMLR Workshop and Conference Proceedings 6:17 164 NIPS 28 workshop on causality Distinguishing Causes from Effects using Nonlinear Acyclic Causal Models Kun Zhang Dept of Computer Science and HIIT University

More information

Hiding Data in a QImage File

Hiding Data in a QImage File Hiding Data in a QImage File Gabriela Mogos Abstract The idea of embedding some information within a digital media, in such a way that the inserted data are intrinsically part of the media itself, has

More information

Gatsby Theoretical Neuroscience Lectures: Non-Gaussian statistics and natural images Parts I-II

Gatsby Theoretical Neuroscience Lectures: Non-Gaussian statistics and natural images Parts I-II Gatsby Theoretical Neuroscience Lectures: Non-Gaussian statistics and natural images Parts I-II Gatsby Unit University College London 27 Feb 2017 Outline Part I: Theory of ICA Definition and difference

More information

Recent Advances in Bayesian Inference Techniques

Recent Advances in Bayesian Inference Techniques Recent Advances in Bayesian Inference Techniques Christopher M. Bishop Microsoft Research, Cambridge, U.K. research.microsoft.com/~cmbishop SIAM Conference on Data Mining, April 2004 Abstract Bayesian

More information

Analysis of methods for speech signals quantization

Analysis of methods for speech signals quantization INFOTEH-JAHORINA Vol. 14, March 2015. Analysis of methods for speech signals quantization Stefan Stojkov Mihajlo Pupin Institute, University of Belgrade Belgrade, Serbia e-mail: stefan.stojkov@pupin.rs

More information

Obtaining Higher Rates for Steganographic Schemes while Maintaining the Same Detectability

Obtaining Higher Rates for Steganographic Schemes while Maintaining the Same Detectability Obtaining Higher Rates for Steganographic Schemes while Maintaining the Same Detectability Anindya Sarkar, Kaushal Solanki and and B. S. Manjunath Department of Electrical and Computer Engineering, University

More information

Invariant Image Watermark Using Zernike Moments

Invariant Image Watermark Using Zernike Moments 766 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 13, NO. 8, AUGUST 2003 Invariant Image Watermark Using Zernike Moments Hyung Shin Kim and Heung-Kyu Lee, Member, IEEE Abstract This

More information

Watermarking in the Space/Spatial-Frequency Domain Using Two-Dimensional Radon Wigner Distribution

Watermarking in the Space/Spatial-Frequency Domain Using Two-Dimensional Radon Wigner Distribution 650 IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL. 10, NO. 4, APRIL 2001 Watermarking in the Space/Spatial-Frequency Domain Using Two-Dimensional Radon Wigner Distribution Srdjan Stanković, Member, IEEE,

More information

Estimation Error Bounds for Frame Denoising

Estimation Error Bounds for Frame Denoising Estimation Error Bounds for Frame Denoising Alyson K. Fletcher and Kannan Ramchandran {alyson,kannanr}@eecs.berkeley.edu Berkeley Audio-Visual Signal Processing and Communication Systems group Department

More information

Robust Multibit Decoding and Detection of Multiplicative Watermarks for Fingerprint Images

Robust Multibit Decoding and Detection of Multiplicative Watermarks for Fingerprint Images JOURNAL OF MULTIMEDIA, VOL. 5, NO. 2, APRIL 2 67 Robust Multibit Decoding and Detection of Multiplicative Watermarks for Fingerprint Images Khalil Zebbiche*, Foued Khelifi # and Ahmed Bouridane* * School

More information

The Karhunen-Loeve, Discrete Cosine, and Related Transforms Obtained via the Hadamard Transform

The Karhunen-Loeve, Discrete Cosine, and Related Transforms Obtained via the Hadamard Transform The Karhunen-Loeve, Discrete Cosine, and Related Transforms Obtained via the Hadamard Transform Item Type text; Proceedings Authors Jones, H. W.; Hein, D. N.; Knauer, S. C. Publisher International Foundation

More information

Comparing Robustness of Pairwise and Multiclass Neural-Network Systems for Face Recognition

Comparing Robustness of Pairwise and Multiclass Neural-Network Systems for Face Recognition Comparing Robustness of Pairwise and Multiclass Neural-Network Systems for Face Recognition J. Uglov, V. Schetinin, C. Maple Computing and Information System Department, University of Bedfordshire, Luton,

More information